Tag Archives: Security Awareness

Cisco’s 2015 Security Report

Cisco said Java represented a whopping 91 percent of all indicators of compromise, the best way to combat it? With some good old fashioned Security Awareness. Cisco’s 2015 annual security report,  was released last week. As part of its report, … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Cisco’s 2015 Security Report

4.5 Malware Variants a Second

According to German Independent IT Security company AV-TEST, there are 12,000,000 variants of malware a month. That’s about 4.5 every second! Malware, a combination of the words Malicious and Software, can be downloaded or sent to users to click on … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on 4.5 Malware Variants a Second

Want Someone’s Password? Just Ask!

Posted in Security Blog | Tagged , , | Comments Off on Want Someone’s Password? Just Ask!

XKCD Comic on Password Strength and Random Words

Use the Four Random English Word Generator!

Posted in Security Blog | Tagged , , , , | Comments Off on XKCD Comic on Password Strength and Random Words

Beware Used or Discount Devices

Because of the introduction of BadUSB, some cybercriminals have been modifying hardware peripherals with some extra storage, some wireless and remote connectivity, and a lot of quality hacker ingenuity. Keyboard with a hardware keylogger built into it This type of … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on Beware Used or Discount Devices

New Scam, Don’t Click Court Ordered Appearance Notification

Bad guys are sending emails claiming to come from a real law firm called ‘Baker & McKenzie’. The email states you are scheduled to appear in court and should click a link to view a copy of the court notice. … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on New Scam, Don’t Click Court Ordered Appearance Notification

Presidential Proposal List

As part in the President’s State of the Union address, Barack Obama is planning on: Insisting that companies reveal data breaches within 30 days Criminalizing the sale of botnets Criminalizing the sale of stolen U.S financial data The President’s twitter feed … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Presidential Proposal List

Stuart Varney, Fox Host, Gets Demo-Hacked By John McAfee

This was in the news yesterday, it is proof that social engineering is the master key to unlock many locks. It is also proof that to keep your lock secured, security awareness and training is needed with the end goal … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , | Comments Off on Stuart Varney, Fox Host, Gets Demo-Hacked By John McAfee

The Raven

An adaptation of Edgar Allen Poe’s famous poem of the Raven. Once upon a midnight dreary, while I pondered weak and weary, Over many a quaint and curious volume of forgotten security lore. While I nodded, nearly napping, suddenly there … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on The Raven

SaveMe App is Actually SocialPath Malware for Android Phones

The Save Me app claims to be able to save a user’s contacts and other data including photos and videos, in the event that a mobile device is lost or stolen but it actually contains a variant of information-stealing malware … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on SaveMe App is Actually SocialPath Malware for Android Phones